Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 04:21
Static task
static1
General
-
Target
2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
21412af89714a3ea74b95e871871258d
-
SHA1
034e85221201ed5d8b9938172e8122dcc80199ed
-
SHA256
e8ba061c5faa8f9c811b758a4d5d803a354a888524adacdbb819b927dbe47918
-
SHA512
fc3519c9956cd02eceb1e432f1ccd853b8a7fbfa5d84a48cf65265d45092631140c72d6e7ed8fe3c6cfd6d46d3ffda9ed4e63600c2abf053d5fbdb41a559ee15
-
SSDEEP
1536:LDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi3:HiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1540 omsecor.exe 3604 omsecor.exe 4132 omsecor.exe 3756 omsecor.exe 628 omsecor.exe 1476 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2692 set thread context of 1612 2692 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 86 PID 1540 set thread context of 3604 1540 omsecor.exe 90 PID 4132 set thread context of 3756 4132 omsecor.exe 116 PID 628 set thread context of 1476 628 omsecor.exe 119 -
Program crash 4 IoCs
pid pid_target Process procid_target 5560 2692 WerFault.exe 85 1804 1540 WerFault.exe 89 232 4132 WerFault.exe 115 208 628 WerFault.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2692 wrote to memory of 1612 2692 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 86 PID 2692 wrote to memory of 1612 2692 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 86 PID 2692 wrote to memory of 1612 2692 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 86 PID 2692 wrote to memory of 1612 2692 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 86 PID 2692 wrote to memory of 1612 2692 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 86 PID 1612 wrote to memory of 1540 1612 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 89 PID 1612 wrote to memory of 1540 1612 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 89 PID 1612 wrote to memory of 1540 1612 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 89 PID 1540 wrote to memory of 3604 1540 omsecor.exe 90 PID 1540 wrote to memory of 3604 1540 omsecor.exe 90 PID 1540 wrote to memory of 3604 1540 omsecor.exe 90 PID 1540 wrote to memory of 3604 1540 omsecor.exe 90 PID 1540 wrote to memory of 3604 1540 omsecor.exe 90 PID 3604 wrote to memory of 4132 3604 omsecor.exe 115 PID 3604 wrote to memory of 4132 3604 omsecor.exe 115 PID 3604 wrote to memory of 4132 3604 omsecor.exe 115 PID 4132 wrote to memory of 3756 4132 omsecor.exe 116 PID 4132 wrote to memory of 3756 4132 omsecor.exe 116 PID 4132 wrote to memory of 3756 4132 omsecor.exe 116 PID 4132 wrote to memory of 3756 4132 omsecor.exe 116 PID 4132 wrote to memory of 3756 4132 omsecor.exe 116 PID 3756 wrote to memory of 628 3756 omsecor.exe 118 PID 3756 wrote to memory of 628 3756 omsecor.exe 118 PID 3756 wrote to memory of 628 3756 omsecor.exe 118 PID 628 wrote to memory of 1476 628 omsecor.exe 119 PID 628 wrote to memory of 1476 628 omsecor.exe 119 PID 628 wrote to memory of 1476 628 omsecor.exe 119 PID 628 wrote to memory of 1476 628 omsecor.exe 119 PID 628 wrote to memory of 1476 628 omsecor.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 2688⤵
- Program crash
PID:208
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 2926⤵
- Program crash
PID:232
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 3004⤵
- Program crash
PID:1804
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 2882⤵
- Program crash
PID:5560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2692 -ip 26921⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1540 -ip 15401⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4132 -ip 41321⤵PID:5692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 628 -ip 6281⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5b72a423f978e639235c4c91c07dbd41b
SHA1a26aef6c5634779d559ab49d4cf529dff5c8e15d
SHA256ac74d27c462e0679b847ce48dfb584592b20905114bfca5a4cd66ffef8bde909
SHA5128c2e2aaa2932c1623a82bd044a2107cfb52a8f1f3f158791762e21dc8120984ee0655d4b72c822678d8107473c69cbbd6a24dd188b9fe89f41c609fb2dcf053d
-
Filesize
134KB
MD56b99e9f451af2d2161e5b1925ae914f2
SHA1f7e5fe7c42f3ba9340b5784bb2d792550b18680e
SHA256cc0f048c3562db7a838ed39c0f8fef5a7637e0335c16f228a1d9099457587c21
SHA5122e69c59ddfa394134d848dc756861ba13f898e787d0ce1f86fd27fab7ed5c4225cc0b09bb3c649896d224aeb3a8f08271c5e90be3d7036f79a07aa01a747d563
-
Filesize
134KB
MD5b2399d4c0beceb561d1cf5329cb44089
SHA182404caae93fd2d01d5954aa9aef00ecf8075d0b
SHA2568c2be4f55440b5cccf90c6503f9ae32a21d7dabd85db0421f6824104de78fa04
SHA512307148fe522d2da999c0f7e7a3dffae5e5662a04847ce4f063e6349b74a5871ac6de4954b3e7f72121a5a77572c76a576e6ec8b7eac903ddb4b1f64650f06428